Click any tag below to further narrow down your results
Links
mkcert is a straightforward tool that enables developers to create locally-trusted SSL certificates without complex configurations. It automatically installs a local Certificate Authority (CA) in the system trust store, allowing for secure development on local hosts. Users can generate certificates for various domains and manage their own CA with minimal effort.
The CA/Browser Forum has approved a plan to reduce the maximum validity period of SSL/TLS certificates from 398 days to 47 days by March 15, 2029, in a bid to enhance internet security and encourage automation in certificate management. This transition will occur gradually, with incremental reductions starting in 2026, but has faced skepticism regarding its practicality and the lack of empirical evidence supporting its effectiveness. Proponents argue that shorter lifespans will enhance security by limiting the exploitation window of compromised certificates and fostering automated management solutions.
The article discusses the growing concerns and chaos surrounding the management of SSL certificates, emphasizing the critical role they play in web security and the potential risks associated with improper handling. It highlights recent incidents that have led to widespread panic and the need for improved standards and practices in certificate management.
The article discusses the competitive landscape between Netscape and Microsoft during the browser wars of the mid-90s, particularly focusing on the development and standardization of the SSL protocol. It highlights the creation of SSL 3.0 by Netscape and the eventual evolution into TLS 1.0 through collaboration and negotiation with Microsoft and the IETF, addressing flaws and ensuring broader support. The narrative reflects on the historical significance and somewhat arbitrary nature of the changes made during this process.
The article discusses the process and implications of vulnerability disclosure concerning SSL for SaaS services using managed CNAME configurations. It highlights the importance of responsible disclosure practices and the steps taken by Cloudflare to address identified vulnerabilities, ensuring the security of their clients and the wider internet community.
Cloudflare's blog discusses the launch of the Azul Certificate Transparency log, designed to enhance security by allowing for better tracking and monitoring of SSL/TLS certificates. The log aims to help organizations detect misissued certificates and improve overall internet trustworthiness. Additionally, it highlights the importance of transparency in digital certificate issuance.
The critical role of SSL in internet security has evolved, prompting a reassessment of SSL strategies among reverse proxies like HAProxy due to performance and compatibility challenges introduced by OpenSSL 3.0. This new version has caused significant regressions in multi-threaded environments, forcing organizations to explore alternative SSL libraries while balancing performance, functionality, and maintenance requirements. Ongoing updates and adaptations are essential for developers navigating this shifting landscape.
NGINX has introduced a preview release of native support for the ACME protocol through the ngx_http_acme_module, allowing users to request, install, and renew SSL/TLS certificates directly via NGINX configuration. This implementation simplifies certificate management by reducing manual errors and reliance on external tools, while enhancing security and workflow efficiency. The article outlines the ACME workflow, its benefits, and encourages users to start utilizing the new feature.
The CA/Browser Forum has voted to reduce the maximum lifespan of SSL/TLS certificates to 47 days by March 15, 2029, a significant decrease from the current 398 days. This change aims to enhance digital security by limiting the potential abuse of compromised certificates, though it is expected to increase the workload for IT administrators who must adapt to more frequent renewals.
mitmproxy is an interactive, SSL/TLS-capable intercepting proxy that supports HTTP/1, HTTP/2, and WebSockets, featuring a console interface. It includes mitmdump, the command-line version, and mitmweb, a web interface. The project is open-source and encourages contributions, with resources available for installation, tutorials, and documentation on its website.
SSL.com faced a significant security flaw in its domain validation process, allowing unauthorized issuance of TLS certificates for legitimate websites, including Alibaba Cloud's domain. A bug hunter demonstrated the exploit by obtaining certificates for domains not owned by them, prompting SSL.com to revoke 11 mis-issued certificates as a precaution. The company has temporarily disabled the flawed validation method while they work on a fix and will provide a full incident report soon.